FreeBSD/Linux Kernel Cross Reference
sys/kern/p1003_1b.c
1 /*-
2 * Copyright (c) 1996, 1997, 1998
3 * HD Associates, Inc. All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by HD Associates, Inc
16 * 4. Neither the name of the author nor the names of any co-contributors
17 * may be used to endorse or promote products derived from this software
18 * without specific prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY HD ASSOCIATES AND CONTRIBUTORS ``AS IS'' AND
21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED. IN NO EVENT SHALL HD ASSOCIATES OR CONTRIBUTORS BE LIABLE
24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30 * SUCH DAMAGE.
31 */
32
33 /* p1003_1b: Real Time common code.
34 */
35
36 #include <sys/cdefs.h>
37 __FBSDID("$FreeBSD: releng/11.0/sys/kern/p1003_1b.c 283377 2015-05-24 14:44:06Z dchagin $");
38
39 #include "opt_posix.h"
40
41 #include <sys/param.h>
42 #include <sys/systm.h>
43 #include <sys/kernel.h>
44 #include <sys/lock.h>
45 #include <sys/module.h>
46 #include <sys/mutex.h>
47 #include <sys/priv.h>
48 #include <sys/proc.h>
49 #include <sys/posix4.h>
50 #include <sys/syscallsubr.h>
51 #include <sys/sysctl.h>
52 #include <sys/sysent.h>
53 #include <sys/syslog.h>
54 #include <sys/sysproto.h>
55
56 MALLOC_DEFINE(M_P31B, "p1003.1b", "Posix 1003.1B");
57
58 /* The system calls return ENOSYS if an entry is called that is not run-time
59 * supported. I am also logging since some programs start to use this when
60 * they shouldn't. That will be removed if annoying.
61 */
62 int
63 syscall_not_present(struct thread *td, const char *s, struct nosys_args *uap)
64 {
65 log(LOG_ERR, "cmd %s pid %d tried to use non-present %s\n",
66 td->td_name, td->td_proc->p_pid, s);
67
68 /* a " return nosys(p, uap); " here causes a core dump.
69 */
70
71 return ENOSYS;
72 }
73
74 #if !defined(_KPOSIX_PRIORITY_SCHEDULING)
75
76 /* Not configured but loadable via a module:
77 */
78
79 static int
80 sched_attach(void)
81 {
82 return 0;
83 }
84
85 SYSCALL_NOT_PRESENT_GEN(sched_setparam)
86 SYSCALL_NOT_PRESENT_GEN(sched_getparam)
87 SYSCALL_NOT_PRESENT_GEN(sched_setscheduler)
88 SYSCALL_NOT_PRESENT_GEN(sched_getscheduler)
89 SYSCALL_NOT_PRESENT_GEN(sched_yield)
90 SYSCALL_NOT_PRESENT_GEN(sched_get_priority_max)
91 SYSCALL_NOT_PRESENT_GEN(sched_get_priority_min)
92 SYSCALL_NOT_PRESENT_GEN(sched_rr_get_interval)
93 #else
94
95 /* Configured in kernel version:
96 */
97 static struct ksched *ksched;
98
99 static int
100 sched_attach(void)
101 {
102 int ret = ksched_attach(&ksched);
103
104 if (ret == 0)
105 p31b_setcfg(CTL_P1003_1B_PRIORITY_SCHEDULING, 200112L);
106
107 return ret;
108 }
109
110 int
111 sys_sched_setparam(struct thread *td, struct sched_setparam_args *uap)
112 {
113 struct thread *targettd;
114 struct proc *targetp;
115 int e;
116 struct sched_param sched_param;
117
118 e = copyin(uap->param, &sched_param, sizeof(sched_param));
119 if (e)
120 return (e);
121
122 if (uap->pid == 0) {
123 targetp = td->td_proc;
124 targettd = td;
125 PROC_LOCK(targetp);
126 } else {
127 targetp = pfind(uap->pid);
128 if (targetp == NULL)
129 return (ESRCH);
130 targettd = FIRST_THREAD_IN_PROC(targetp);
131 }
132
133 e = kern_sched_setparam(td, targettd, &sched_param);
134 PROC_UNLOCK(targetp);
135 return (e);
136 }
137
138 int
139 kern_sched_setparam(struct thread *td, struct thread *targettd,
140 struct sched_param *param)
141 {
142 struct proc *targetp;
143 int error;
144
145 targetp = targettd->td_proc;
146 PROC_LOCK_ASSERT(targetp, MA_OWNED);
147
148 error = p_cansched(td, targetp);
149 if (error == 0)
150 error = ksched_setparam(ksched, targettd,
151 (const struct sched_param *)param);
152 return (error);
153 }
154
155 int
156 sys_sched_getparam(struct thread *td, struct sched_getparam_args *uap)
157 {
158 int e;
159 struct sched_param sched_param;
160 struct thread *targettd;
161 struct proc *targetp;
162
163 if (uap->pid == 0) {
164 targetp = td->td_proc;
165 targettd = td;
166 PROC_LOCK(targetp);
167 } else {
168 targetp = pfind(uap->pid);
169 if (targetp == NULL) {
170 return (ESRCH);
171 }
172 targettd = FIRST_THREAD_IN_PROC(targetp);
173 }
174
175 e = kern_sched_getparam(td, targettd, &sched_param);
176 PROC_UNLOCK(targetp);
177 if (e == 0)
178 e = copyout(&sched_param, uap->param, sizeof(sched_param));
179 return (e);
180 }
181
182 int
183 kern_sched_getparam(struct thread *td, struct thread *targettd,
184 struct sched_param *param)
185 {
186 struct proc *targetp;
187 int error;
188
189 targetp = targettd->td_proc;
190 PROC_LOCK_ASSERT(targetp, MA_OWNED);
191
192 error = p_cansee(td, targetp);
193 if (error == 0)
194 error = ksched_getparam(ksched, targettd, param);
195 return (error);
196 }
197
198 int
199 sys_sched_setscheduler(struct thread *td, struct sched_setscheduler_args *uap)
200 {
201 int e;
202 struct sched_param sched_param;
203 struct thread *targettd;
204 struct proc *targetp;
205
206 e = copyin(uap->param, &sched_param, sizeof(sched_param));
207 if (e)
208 return (e);
209
210 if (uap->pid == 0) {
211 targetp = td->td_proc;
212 targettd = td;
213 PROC_LOCK(targetp);
214 } else {
215 targetp = pfind(uap->pid);
216 if (targetp == NULL)
217 return (ESRCH);
218 targettd = FIRST_THREAD_IN_PROC(targetp);
219 }
220
221 e = kern_sched_setscheduler(td, targettd, uap->policy,
222 &sched_param);
223 PROC_UNLOCK(targetp);
224 return (e);
225 }
226
227 int
228 kern_sched_setscheduler(struct thread *td, struct thread *targettd,
229 int policy, struct sched_param *param)
230 {
231 struct proc *targetp;
232 int error;
233
234 targetp = targettd->td_proc;
235 PROC_LOCK_ASSERT(targetp, MA_OWNED);
236
237 /* Don't allow non root user to set a scheduler policy. */
238 error = priv_check(td, PRIV_SCHED_SET);
239 if (error)
240 return (error);
241
242 error = p_cansched(td, targetp);
243 if (error == 0)
244 error = ksched_setscheduler(ksched, targettd, policy,
245 (const struct sched_param *)param);
246 return (error);
247 }
248
249 int
250 sys_sched_getscheduler(struct thread *td, struct sched_getscheduler_args *uap)
251 {
252 int e, policy;
253 struct thread *targettd;
254 struct proc *targetp;
255
256 if (uap->pid == 0) {
257 targetp = td->td_proc;
258 targettd = td;
259 PROC_LOCK(targetp);
260 } else {
261 targetp = pfind(uap->pid);
262 if (targetp == NULL)
263 return (ESRCH);
264 targettd = FIRST_THREAD_IN_PROC(targetp);
265 }
266
267 e = kern_sched_getscheduler(td, targettd, &policy);
268 PROC_UNLOCK(targetp);
269 if (e == 0)
270 td->td_retval[0] = policy;
271
272 return (e);
273 }
274
275 int
276 kern_sched_getscheduler(struct thread *td, struct thread *targettd,
277 int *policy)
278 {
279 struct proc *targetp;
280 int error;
281
282 targetp = targettd->td_proc;
283 PROC_LOCK_ASSERT(targetp, MA_OWNED);
284
285 error = p_cansee(td, targetp);
286 if (error == 0)
287 error = ksched_getscheduler(ksched, targettd, policy);
288 return (error);
289 }
290
291 int
292 sys_sched_yield(struct thread *td, struct sched_yield_args *uap)
293 {
294
295 sched_relinquish(curthread);
296 return 0;
297 }
298
299 int
300 sys_sched_get_priority_max(struct thread *td,
301 struct sched_get_priority_max_args *uap)
302 {
303 int error, prio;
304
305 error = ksched_get_priority_max(ksched, uap->policy, &prio);
306 td->td_retval[0] = prio;
307 return (error);
308 }
309
310 int
311 sys_sched_get_priority_min(struct thread *td,
312 struct sched_get_priority_min_args *uap)
313 {
314 int error, prio;
315
316 error = ksched_get_priority_min(ksched, uap->policy, &prio);
317 td->td_retval[0] = prio;
318 return (error);
319 }
320
321 int
322 sys_sched_rr_get_interval(struct thread *td,
323 struct sched_rr_get_interval_args *uap)
324 {
325 struct timespec timespec;
326 int error;
327
328 error = kern_sched_rr_get_interval(td, uap->pid, ×pec);
329 if (error == 0)
330 error = copyout(×pec, uap->interval, sizeof(timespec));
331 return (error);
332 }
333
334 int
335 kern_sched_rr_get_interval(struct thread *td, pid_t pid,
336 struct timespec *ts)
337 {
338 int e;
339 struct thread *targettd;
340 struct proc *targetp;
341
342 if (pid == 0) {
343 targettd = td;
344 targetp = td->td_proc;
345 PROC_LOCK(targetp);
346 } else {
347 targetp = pfind(pid);
348 if (targetp == NULL)
349 return (ESRCH);
350 targettd = FIRST_THREAD_IN_PROC(targetp);
351 }
352
353 e = kern_sched_rr_get_interval_td(td, targettd, ts);
354 PROC_UNLOCK(targetp);
355 return (e);
356 }
357
358 int
359 kern_sched_rr_get_interval_td(struct thread *td, struct thread *targettd,
360 struct timespec *ts)
361 {
362 struct proc *p;
363 int error;
364
365 p = targettd->td_proc;
366 PROC_LOCK_ASSERT(p, MA_OWNED);
367
368 error = p_cansee(td, p);
369 if (error == 0)
370 error = ksched_rr_get_interval(ksched, targettd, ts);
371 return (error);
372 }
373 #endif
374
375 static void
376 p31binit(void *notused)
377 {
378 (void) sched_attach();
379 p31b_setcfg(CTL_P1003_1B_PAGESIZE, PAGE_SIZE);
380 }
381
382 SYSINIT(p31b, SI_SUB_P1003_1B, SI_ORDER_FIRST, p31binit, NULL);
Cache object: cd0f9af8359f4aaaa39c2b2909345036
|